Due to use of unsafe YAML deserialization logic, an attacker with the ability to modify local YAML configuration files could provide malicious input, resulting in remote code execution or similar risks.
The issue can be patched by upgrading to v1.1.0 or later. It can also be patched by replacing YAML deserialization with equivalent safe_load calls.
{ "nvd_published_at": "2021-09-10T23:15:00Z", "cwe_ids": [ "CWE-502" ], "severity": "MODERATE", "github_reviewed": true, "github_reviewed_at": "2021-09-13T19:10:21Z" }